I have a pfSense firewall that has a WAN with multiple public IP addresses. I use NAT to port forward certain external IPs to internal IPs.
I can connect from anywhere except same country. When anyone within my country tries to connect to any external IP address and port, they are unsuccessful. I've captured packets on the WAN interface and I see them coming in.
I've double checked and there is indeed a WAN rule that allows the accessed ports to NAT through to the servers that I intend them to. We have no Geo IP checking or any IP address based rules to block traffic to those servers.
-- I have noticed a difference between working connections and non working connections
Using packet capture on pfSense (replaced some numbers with ###.### which are the same numbers for all)
Non working connection:
22:26:25.140803 IP 190.150.206.159.50852 > 190.###.###.2.80: tcp 0
22:26:25.140828 ARP, Request who-has 190.150.206.159 tell 190.###.###.3, length 28
Working Connection:
22:24:26.164293 IP 24.189.161.72.5550 > 190.###.###.2.80: tcp 0
22:24:26.164305 IP 190.###.###.2.80 > 24.189.161.72.5550: tcp 1460
Another connection from a pc on a different port to a different WAN IP address (Same PFSense)
Non Working computer
09:39:05.612067 IP 190.87.162.111.2463 > 190.###.###.4.3389: tcp 0
09:39:08.610073 IP 190.87.162.111.2463 > 190.###.###.4.3389: tcp 0
09:39:14.608856 IP 190.87.162.111.2463 > 190.###.###.4.3389: tcp 0
Working Computer
09:41:04.412975 IP 68.196.25.71.60666 > 190.###.###.4.3389: tcp 85
09:41:04.459077 IP 190.###.###.4.3389 > 68.196.25.71.60666: tcp 0
09:41:04.492887 IP 68.196.25.71.60666 > 190.###.###.4.3389: tcp 101
09:41:04.537100 IP 190.###.###.4.3389 > 68.196.25.71.60666: tcp 0
09:41:06.177903 IP 190.###.###.4.3389 > 68.196.25.71.60666: tcp 101
09:41:06.309178 IP 68.196.25.71.60666 > 190.###.###.4.3389: tcp 0
I see in the Firewall that it is allowed but I cant figure out what is blocking it.